Computer Notes
Computer Notes
Computer studies
Is a subject that deals with the study of what computers are, how they work and how
to use them. It also involves the application of scientific principles in the design,
construction and maintenance of computer-based systems.
Computer
Is an electronic device(machine) that works under the control of an operating system
automatically accepting and processing data to produce information.
1
Note:
Data normally flows from input devices or backing storage into main memory
and from main memory to output devices or backing storage.
In some cases data flows directly from input devices to the processor and from
the processor to the output devices
The processor performs operations on data from main storage and returns the
results of processing to backing storage
Input
Storage
Control
Processing
Output
Input devices
Are used to enter data into the computer for storage and processing after converting it
to computer-readable form i.e. electronic signals. Currently input devices range from
those that enter speech, handwritten text, pictures etc.
Main storage
Data and instructions enter main storage until needed for processing. Storage is
mainly used for:
Control Unit
Is the circuitry responsible for managing and directing all operations of the computer.
It decodes and interprets instructions and issues necessary signals to all computer
components.
Central processor
Is the part responsible for all computing i.e.:
arithmetic operations like addition, subtraction, division and multiplication and
logical operations(comparisons) like >, <, =, >=, <=, NOT, AND, NAND, NOR,
XOR etc
Output devices
Are peripheral devices responsible for displaying or printing the results of processing
(information). These convert information from electronic signals and present in
human-readable form. Printed information is called hardcopy and information
displayed on the screen is called softcopy.
Hardware
2
Refers to all physical components of a computer (mechanical and electronic) that are
tangible e.g. the monitor, keyboard, CPU etc.
Software
Are all programs installed or that can be installed on a computer together with
associated documentation e.g. Windows XP, MS Office 2000, Novell Netware etc.
Software is divided into two main classes:
systems software and
applications software
Firmware
Is a combination of both hardware and software i.e. software embedded in electronic
chips e.g. ROM.
Data
Are all raw facts and figures that are entered into the computer for processing e.g.
prices of products and sales figures.
Information
Refers to the processed version of data that is meaningful e.g. the calculated profits
from sales figures
Program
Is a set, sequence or suite of instructions written in a computer programming
language to perform a certain or specific function.
Classification of computers
Computers can be classified by two ways:
Mainframe computer
Is the largest computer in terms of:
processing capacity and speed
physical size
storage capacities
Mainframes are or were mainly used as servers on large networks of very large
organizations like Government departments or ministries, banks, private companies
etc. Mainframes produce a lot of heat and as such are housed in specially ventilated
and air-conditioned rooms.
Minicomputer
Is or was the second largest computer after the mainframe in terms of:
processing capacity and speed
physical size
storage capacities
3
Minicomputers are or were used as servers on fairly large networks e.g. DEC’s VAX
range
Microcomputers
Is the ordinary desktop PC that is built on a microprocessor chip. It uses the
microprocessor as its CPU.
Various integrated circuits and elements of a computer are replaced by a single
chip known as integrated circuit.
The design of the microcomputer is modular i.e. it consists of self-contained
units mounted on a main circuit card known as the motherboard which
incorporates a microcomputer and enough memory. Examples include IBM PC,
Compaq, Macintosh, Apple, Commodore etc.
Digital computers
Are the most common types of computers which store, process and represent
data in discrete values of 1s and 0s.
They also use the value 1 to mean ON and 0 to mean OFF
Each number, letter or special symbol is a special 3-number code which will be
changed to a series of various combinations of 1s and 0s.
Digital computers are used business, schools, hospitals and homes
Analog computers
They process data in form of electrical voltages and hydraulic pressures. They
are similar in operation to measuring devices and thus measure variable
magnitudes.
Output from analog computers is often in form of smooth graphs from which
information can be read
Are mostly used in research and engineering institutions
Hybrid computers
As their name suggests, they have combined features of both digital and analog
computers
Are mostly used in research institutions but are not very common.
4
The microprocessor
Is a single microchip containing all the elements of a CPU. It can also be referred to as
a processor on a silicon chip with circuits imprinted on a small wafer of silicon.
Microprocessor-based systems
Being cheap, small and fast in operation, microprocessors are ideally suitable for
implementation in control applications.
Microprocessors can be programmed to carry out a predetermined sequence of
operations. Examples of microprocessor-based applications are:
Microwave cookers
Function by switching a microwave unit on for a sufficient time to either defreeze
frozen food or cook it. Modern cookers have sensors attached to a microprocessor for
detecting:
Weight of food
Temperature of food
When turned on, the sensors take the above readings, and the microprocessor
continually monitor sensor readings and by referring to a programmed in-built
database of food types, the microprocessor determine time needed to cook or defreeze
food.
Burglar alarms
Have a number of sensors that are linked and continually monitored by a
microprocessor to determine for a change of state. Sensors normally detect:
When such changes are detected, an alarm or bell may be rang and in advanced
system, if the system is connected to a telephone, a message can be relayed to the
Police
Autofocus camera
Are fitted with several sensors that send data to an in-built microprocessor that make
calculations and adjustments on the best way of getting the picture wanted.
When the exposure button is pressed, a high frequency sound is sent from the camera
to the object and after hitting the object, it bounces back to the receiver on the
camera.
5
The microprocessor calculates the distance and time taken by sound to travel from the
camera to the object and back to the camera
Using the calculation results, it will set accordingly the following:
exposure
focus
zooming
A photocell or light sensor is used to measure the intensity or level of light.
6
4.1 APPLICATION OF COMPUTERS AND THEIR SOCIAL ECONOMIC
IMPLICATIONS
The text message is sent over a telephone system from the sending computer to a
central computer known as the electronic post office, which allocates disk space to act
as an electronic mail box for each user. To access the mailbox, the user will have to
enter the password, which acts as a key to the mailbox. The password is important
because it acts as a security measure for the mailbox. To be able to use and receive e-
mails, the user must have an e-mail address and a computer connected to a telephone
line with either an in-built MODEM or external MODEM.
Linny@kutamacollege.ac.zw
User’s name
The above simply means, Linny has an e-mail account with an academic institution
called kutamacollege based in Zimbabwe.
NOTE:
Ac: refers to academic institution such as college, university or school
Org: refers to organization
Co/com : refers to company or co-operation
7
(e) safe mail delivery since there is no human intervention like post men
(f) e-mails can be electronically filed and stored
Disadvantages of e-mails
(a) can only be used by people with access to the Internet or e-mail facility
(b) leads to loss of jobs for the postal industry since less letters will be going
through the conventional post office
(c) there is a possibility of some computer hackers intercepting some confidential
people’s e-mails
The Internet is a complicated information storage system where files are located in
thousands of sites across the world. The files contain a variety of information ranging
from text, graphics, software, video and audio recordings.
website
Is an Internet address where information about a particular individual, company or
country is found.
8
A website carries a common format as below:
www.digitalsystems.co.zw
name of company
Normally the ‘http’ that comes before www stands for ‘hyper text transfer protocol’
Search engine
A program that is used to navigate and search for and display information available on
the requested website e.g. the yahoo search engine, goggle search engine etc. It
performs the similar function with the Internet explorer which is a Microsoft tool used
to browse and navigate(explore) the Internet.
Once you have the above, you then contact an ISP who will issue the following:
9
(b) Telephone number(to dial in order to get a connection)
Intranet
Is a closed network private to a school, college or organization which contains
information stored centrally for that particular organization. Intranet are mainly used
by large multinational companies such as Johnson & Johnson, Unilever, etc.
This system is only possible through use of specialist studio equipment or attached
telephone, microphone and digital camera to take motion video clips and upload them
instantly such that they will be seen by the other people connected.
Facsimile(fax)
Is a system in which documents are placed in a fax machine which scans the
document line by line converting it into a stream of electronic pulses which will then
be transmitted over a telephone to the receiving fax machine which converts the
electronic pulses back to the original message which will be printed on the paper.
To send a document using a fax, the person insert a document in a fax paper tray and
then dial the receiving fax machine number, if the line is free then the fax machine
scans the document into stream of electronic pulses which will be sent over a
telephone line and converted back from pulses to the original message and printed at
the receiving fax machine.
Fax machines use microprocessors to scan the documents and convert the messages
line by line to electronic pulses and then back to the original message.
However there are new developments under Microsoft Fax program where a fax
message can be created on the PC and send it through the telephone line to the
receiving fax machine.
Teletext
Is a system in which textual information such as sports news, weather reports, airline
and train schedules is broadcast via television sets in one direction only.
The TV set or receiver is only able to receive the information and cannot communicate
back. The system needs a TV set, a special adapter and a special remote control for
use when choosing particular information e.g. the BBC’s version called Ceefax and
Independent Broadcasting Authority’s version called Oracle.
Teletex
Is a new version of the old telex system which is a further development from teletext in
that it is compatible with the fax and is able to send both pictures and text unlike
teletext which can only send text?
10
INFORMATION SYSTEMS
Library systems
Are computer-based systems which allow one handle loaning out, returning, booking
and queries about book status easily?
A typical library contains thousands of books, journals, magazines, reports etc which
borrowers may wish to borrow. Maintaining such records of books and borrowers is
best done by a computer system which will contain all or part of the following
information:
If the librarian enters the book number, the system will search in its database and
display the result e.g. whether the book is available, if not available, the system will
display details of the person who has borrowed it and when it will be returned.
The system will be able to produce various reports such as those for:
Office automation
The substantial use of computers in conjuction with other electronic equipment such
as answering machines, fax machines, telephones, photocopier, duplicating machines,
word processors etc to automate basic secretarial and clerical duties in the office.
The repetitive and routine nature of large amount of office work makes a target for
office automation. Most office automation systems in use involves PCs or work stations
on a network with print servers and file servers which provides access to a variety of
11
software including word processing, spreadsheet, databases, e-mail, fax, uploading
data points etc.
Online systems
An online system is one that is interactive in nature meaning it allows the user to
interrogate the system or supply information and get an instant response.
Online systems are mainly used in banking systems and hotel and airline booking
systems.
Multimedia(aka hypermedia)
An interactive system used for presentation of audio, video and text data as a way of
communicating information.
12
(d) give and mark a test instantly
13
Application of computers in commercial and general data processing
banking
accounting and manufacturing
personnel systems
hospitals
electronic commerce
stock control
cash withdrawals
cash deposits
balance enquiries
statement requests
cheque book application
pay for bills e.g. ZESA, TelOne, City of Harare
change PIN(Personal Identification Number)
inter-account funds transfer
Advantages of ATMs
Disadvantages of ATMS
Examples include Zimbank’s Bank Direct Program and Standard Chartered’s EBS for
Windows(Electronic Banking System for Windows)
cash withdrawal
cash deposits
encashment of cheques
foreign currency transactions
Advantages of e-banking
the system is safe since no carrying of large sums of money is involved which
attract thieves
convenience as transactions can be done in the comfort of the office or home
any time
security as the system as in-built security features such as passwords and
access and authorisation level codes.
cheaper since there are no transport costs and related cheque processing fees
faster and efficient as the system does not involve standing in queues
15
Is a facility that allows the account holder to transfer funds from one account to
another or to make payments?
The card is swiped and scanned by computerized sensors at the point of sale(till point)
and the card holder is asked to enter the PIN. If the PIN is correct, money is
transferred (debited) from the account of the account holder and credited to the shop’s
account if the system is online.
Internet banking
A new development in banking where people can access their accounts through the
Internet and perform various functions.
funds transfer
checking exchange rates
checking account balances
downloading and printing statements
cash deposits
cash withdrawals
cheque processing
foreign currency transactions
loan processing
e-commerce(electronic commerce)
Is basically trading through use of computer and telecommunications networks and
involves the exchange of standard business documents such as orders, invoices and
statements through computer networks of trading partners usually managed by a
specialist third party e-commerce company such as Tradanet.
Order processing
This involves the exchange of standard business documents such as orders, invoices
and statements through computer networks of trading partners usually managed by a
specialist third party e-commerce company
In Zimbabwe, a good example is the use of Tradanet’s EDI program called Intercept
Plus for:
16
placing orders
sending invoices
making payments(funds transfer)
Examples of shops which use Intercept Plus program are OK, Spar, Johnson &
Johnson, Charhons etc.
If an order is received, the system checks if there are enough stocks and then
its processed. If stocks are not adequate for the order, the order is placed on
back order which will be processed when the stocks become available.
The selling company will then send an invoice to the buying company
If the buying company receives the goods and invoices, it will electronically
transfer funds from its company account to that of the selling company account
employment history
qualifications
training
salary scale
allowances and deductions
payment details
Calculations of salaries and wages used to be time consuming, tedious and labourious
task as it involved repetitive tasks.
These days workers use clock or time cards when they come to work and when they
finish which they swipe on computerised time-logging and scanning machine which
reads employee details encoded on the black strip and capture time of entry or exit.
The recorded times will be used to calculate salaries based on the hourly rate or scale
applicable to the grade of that particular employee. Such systems can be used together
with the electronic salary payment system such as the Paynet from Tradanet.
Monitoring systems
Are systems designed to monitor critically ill patients or premature babies. Some
biosensors connected to the computer are attached to the patient for tracking and
recording vital signs such as:
The biosensors will transmit readings to the central computer should the situation go
beyond a critical warning level and :
to clone more data from health experts in view of new disease complications
to administer drugs or oxygen to patients
Surgery systems
Computers are now used to control laser light that can be used instead of the
surgeon’s scapel for performing delicate operations. Using such equipment, an eye
surgeon can cut and reshape the lens of the patient’s eye thereby correcting sight
defects.
18
Laboratory systems
Computers are used to perform medical imaging i.e. computerized scanning
equipment is used to produce 3-dimensional colour images inside the body which is
used to observe the actual living chemical processes during research. This is a further
development to the traditional x-ray.
Prosthetics systems
Prosthesis refers to the replacement and substitution of limbs and other organs by
artificial aids to correct and aid physical defects.
Common examples of prosthetics include eye glasses, dental bridges and artificial
limbs. Computers are used to design and test artificial devices for humans e.g. a
computer can be used to design a hip joint that can be surgically implanted to replace
defective joints.
Stock control
For hospital blood stocks, food stocks, drug stocks etc
Booking system
For out-patients and in-patients to see the doctor
Personnel records
For keeping and management of employee records
Data logging
Recording patients’ medical data over some time for later analysis
19
Application of computers in industry, technical and scientific uses
Flight simulators are used to train pilots where the inside has all the controls found in
a plane and looks like a real inside of a plane but in reality it will be an artificial room
on computer-controlled and operated hydraulic supports.
The flight simulators has cock pit windows like a plane. The simulator produces thrust
and noise on take off and landing that gives trainee pilots a live experience of a plane.
Advantages of simulation
cheaper since not the actual expensive planes or material is used
if an accident occurs, no-one is hurt or injured
all possible situations are simulated whether dangerous or not
emergency reactions can also be simulated without any harm to the people
The concept of simulation gives engineers a better appreciation and prediction of what
will happen in real life situation from a model of that system.
Model
Is a sequence of ideas that attempt to represent a process realistically. At some stage
these ideas are expressed mathematically as a set or collection of equations.
Modeling
Is representing a process using a series of mathematical ideas that approximate how
the real process behaves. Ideally the approximation should be very close to the actual
process.
A model is a small replica of a system which shares the same qualities and
resemblance with the actual system or object in order to study its various features.
An example is where engineers, when designing a bridge, would first construct a model
of the bridge and then study:
effects of stress
various loading conditions
20
The idea of modeling is to make one have real or tangible appreciation and
understanding of the real object or system.
NB. Some models can be bigger than the actual object or system e.g. molecular
structure models.
Weather forecasting
Meteorologists and scientists from various weather stations around the world get
weather data such as:
Air pressure
Temperature
Humidity
Wind speed
Cloud cover
Sunshine
from world wide network of space satellites, air planes and ground stations. These
measurements are then entered into a mathematical weather model which then makes
complex calculations to come up with the weather reports.
Weather forecasting uses the concept of simulation and modeling i.e. predicting the
weather by studying a mathematical weather model.
Processing
Measurements of weather data are fed into a mathematical computer weather model
which will compute the equations and come up with a forecast.
CAD(Computer-Aided Design)
Refers to the integration of computers and graphics software to automate the
engineering design process.
NOTE: see GCE Computer Studies & Information Systems – for more details
The CAD software records the input data in a database and is able to manipulate
these facts interactively and display the results on the screen. A typical CAD system
consists of the following:
Processing
Generating and interactive manipulation of engineering equations to come up with
stress equations
CAM(Computer-Aided Manufacture)
Is basically automated manufacturing process where computers are used to regulate
and monitor the production process.
CAM use some industrial robots or computer-controlled sensors for detecting:
Excessive heat
Faults
Acceleration forces
Image processing
Computers are used to process images taken by modern digital cameras. These digital
cameras e.g. the Canon have light-sensitive area which is linked to the memory that
can record the image data.
The image data is recorded to a backup medium such as a CD or diskette and then
downloaded onto the computer for processing by copying from the diskette or
connecting the camera to the computer.
NOTE: see Heathcote and Bradley and Marking Scheme 2003 – Cambridge for
further details
22
Application of computers in monitoring and control systems
Monitoring system
Control system
Is a system in which one or more computers are used to control the operation of some
non-computer equipment usually involving some monitoring and logging of physical
quantities, providing some analysis of performance and allowing some user
interactions.
Feedback and timing are critical considerations and at times. Such control systems
are referred to as real-time control systems.
Oil refining
Chemical processing
Integrated traffic control systems
Such computers are called autopilots that are able to keep the aeroplane at preset :
Height
Speed
Direction
Rate of descent
Process control
Is the aspect of using computers to monitor and control or regulate continuous
industrial processes which convert input materials into useful products e.g. steel plant
at ZISCO, oil refineries, chemical plants etc.
Various instruments and sensors are used to monitor the following variables:
Temperature
Light
23
Heat
pressure
If any abnormalities or extreme conditions are detected, the system can either:
SwitchON/OFF Signal
The above setup is used to heat the liquid in container A and keep it in the range 80 C
to 90C. The procedures would be as follows:
Senses conditions
Compares conditions with preset limits
Adjust input if necessary
24
Components of process control
Sensors
for detecting conditions such as heat, light, sound etc
Microprocessor(Process Controller)
for electronic processing of digital data and sending regulating signals to controlled
devices
Software
used for holding programmed control procedures i.e. set of instructions which
make a system work e.g. control procedure for water heating process would be:
Read temperature
Compare temperature with preset limits
If temperature is greater than preset temperature THEN SWITCH OFF
If temperature is less than preset temperature THEN SWITCH ON
Return to step 1
Output devices
Depends on the type of system e.g.:
Interconnection devices
Equipment or interfaces which convert data sent down from one device into a form
suitable for the receiving device e.g. the ADC(Analog-to-Digital Conveter)
Environmental control
To maintain and regulate environmental conditions such as temperature, light and
noise levels, humidity, water and chemical reactions such as amount of salt and
concentration of chemicals e.g. pH levels in a given liquid
Production control
To monitor and regulate robots and other manufacturing machines
Quality control
To detect and reject any substandard products from the production line
Security control
To detect intruders tempering with equipment such as locks, safes, doors etc.
Feedback
Output from a process which is used to modify its input e.g. sensors sent back
readings to the microprocessor which in turn send regulating signals to take
appropriate actions.
Negative feedback
Which leads to a decrease in the output
Process variable
Any physical quantity that can vary e.g. temperature, pressure level of a liquid in a
pipe or tank
Process controller
Microprocessor which ensure that the process variable e.g. temperature, stays within
the preset range.
Another example of automated system is found at a nuclear power plant where in the
event of an accident, many automated steps take place such as:
26
Application of computers in automation and robotics
A microprocessor is a single microchip with all the elements of the CPU. It can also be
defined as a processor on a silicon chip with circuits imprinted on a small wafer of a
silicon chip.
27
A microwave may be programmed as follows:
Such a system uses an OR logic gate which produces a 0(zero) if one or both of the
inputs is 0(zero) else output is 1. (See page 44-51 for application of logic gates from
Computer Studies Through Applications by Kennewell et al.)
Drain
28
(e) Auto-focus camera
Such cameras are fitted with several sensors that send data to an in-built
microprocessor that makes calculations and necessary adjustments on the best way of
getting the picture wanted.
During the instant when one presses the exposure button, a high frequency sound is
sent from the camera to the subject and back to the receiver on the camera. The
microprocessor measures the time taken by the high frequency sound to return and
then calculate the distance and thereafter set the focus accordingly. To set the
exposure, the photocell is used to measure the intensity of light and thereafter the
microprocessor sets the proper exposure. The microprocessor is also used to adjust
the opening of the lens, and better still some modern cameras have a predictive focus
technique to focus and take pictures of fast-moving objects such as running animals
or athletes.
auto-focus
auto-flash
auto-zoom
29
Robotics
Refers to the science, study and use of robot technology.
Robots
Refers to programmable and computer-controlled machines with mechanical arms
used to carryout a variety of jobs especially in engineering and manufacturing fields. A
common example of the application of robots is in automotive engineering where they
are used in car assembly.
NOTE: Robots come in different structures and the above is a just an example
Components of robots
(b) Wrist
Acts as a joint and link between the gripper and the arm. Its main purpose is to direct
and control movement of the gripper.
(c) Arm
Is the mechanical component that is similar in structure to a human arm whose
purpose is to direct the gripper and acts as mechanical lever for lifting up objects in a
production line.
(d) Sensor
Take the form of electrical or optical devices and fitted on various parts of the robot to
obtain necessary data that will be used to control the robot operations. Its main
function is to collect data from the robot operating environment and send the data as
signals to the microprocessor which will then send regulating or control signals to
various robot components.
31
Classification of robots
(a) Manual handling device – simplest form of robot usually controlled and
operated by a human operator
(b) Fixed sequence robot – handling device which follows a fixed sequence of stages
in carrying out a programmed task and usually its difficult tomodify
(c) Variable sequence robot – almost same as fixed sequence except that the stages
can modified easily
(d) Playback robot – such robots study and record manual task operations being
done by a human operator and the information can then be recalled enabling
the robot to do the task in automatic mode
(e) Numerical control robot – has a facility that allows the human operator to
supply the robot with a movement program rather than teaching it the task
manually
(f) Intelligent robot – has a means to understand its environment and ability to
successfully complete a task despite changes in surrounding conditions.
Advantages of robots
(a) Can work in dangerous conditions without any harm e.g. in diffusing bombs,
undersea exploration, on other planets, areas with high radioactive material, or
where dangerous gases are found such as in Nuclear Power Plants
(b) Can be programmed to do several different tasks unlike other automated tasks
that are dedicated to one specialist task e.g. washing machine
(c) Can work 24 hours a day untiringly
(d) Can work in extreme conditions not suitable for humans e.g. in areas where
there is extreme heat, cold or noise that can damage human ear drums etc.
(e) Reduce labour costs thus production costs becomes lower
(f) Consistency in quality of work unlike humans where there is variation
(g) Increased productivity due to speed at which they perform work
(h) Can perform repetitive tasks without any boredom or fatigue
Disadvantages of robots
(a) Can replace some workers thus it leads to loss of jobs
(b) Can produce fault or wrong products if wrongly programmed as it can not
operate on normal reasoning or common sense
(c) Robots are expensive to buy
(d) Some robots need highly skilled and trained engineers to operate and maintain
them
(e) Robots are not as versatile as people i.e. they can only do one particular
operation they have been programmed for at a time unless reprogrammed
32
Application of computers in Artificial Intelligence(AI) and Expert Systems(ES)
Artificial Intelligence
The science and concept of using computers to solve problems and make decisions
that would normally be done by intelligent human beings. A good example is the use of
computers to play master level chess beating some of the best human chess players.
The program has a number of programmed moves that it would make if the opponent
makes a move.
The reality is computers are not intelligent but are programmed to make a series of
moves in response to moves made by their opponents. It is merely their speed and
ability to access huge amounts of stored data which make them appear intelligent. AI
has led to the development of commercial products(systems) called Expert Systems.
User interface
Point of interaction between the user and the system in form of dialogue boxes which
asks the user to enter inputs and the system supply the output through that same
point. The ES has a facility called justifier which enables the user to ask the system
for its line of reasoning that it has used to reach its conclusion and recommendation.
Inference engine(processor)
Searches, matches, reasons and make decisions from the facts and rules in the
knowledge base to give a solution. It uses the following approaches:
Logical deduction
Reasoning by analog
Procedural reasoning(use of mathematical models/steps)
Knowledge base
Contains rules, details and facts about a particular field. These are cloned from one or
more highly qualified and experienced experts in particular fields e.g. medicine. The
human experts are interviewed by specially trained professionals called knowledge
engineers who would then prepare and enter the data in the knowledge base. Some Es
33
have a built-in feature for ‘learning from experience’ that allows the ES to learn and
add to its knowledge base records of its successes (and mistakes at times).
Inputs
Geological data such as rock and soil type
Processing
Draws conclusions from rules and facts using geological data entered and the mineral
data stored in the knowledge base
Output
Possible mineral deposits that can be found in that area
Medical diagnosis
Various expert systems are used to diagnose diseases and recommend treatment.
Common examples include:
Inputs
Signs and symptoms of the patient
Processing
Draws conclusions from rules and facts using patient’s symptoms entered and the
health data stored in the knowledge base
Output
Disease infection, treatment and medication recommendations
means that the virus HTLV 3 is associated with the disease AIDS with a certainity
factor of 1.0. The knowledge is processed by a set of production rules of the form:
At the start of the diagnosis, many of the items of knowledge are incomplete, or
certainty factors in them are near zero. During a diagnosis, additional knowledge is
accumulated and certainty factors move towards –1 or +1. The physician enters
34
background information and symptoms and is asked to give any other information by
the computer as required. At the end of the diagnosis, conclusions are displayed
together with certainty factors. At any stage, the line of reasoning and intermediate
conclusions may be examined by the physician or doctor.
Farming
Some ES are used to advise farmers in different regions on the best crop or animal
production to carry out e.g. the e-Hurudza in Zimbabwe.
Inputs
Climatic conditions and soil type in that area
Processing
Draws conclusions from rules and facts using soil and climatic data entered and the
crop and animal data stored in the knowledge base
Output
Best crop and animal production to be carried out in that area e.g. the ES might
advise the farmer the crop type and varieties to grow or the cattle breed to stock in
that region.
35
Miscellaneous application of computers
Animation
Is the process of creating a number of images with each slightly different from the
previous one and playing them in rapid succession such that there is an illusion of
movement e.g. in creation of cartoons.
Walter Disney’s early cartoon called Mickey Mouse was done using animation. TV films
and videos use animation technique where several frames are recorded and played so
fast such that the human eye cannot detect any differences.
The process of creating many individual frames was tedious, slow and required lots of
artists thus in the past the whole process would become expensive. These days
software is now available that allows one to create only two frames the first and the
last and then the computer will create a sequence of frames between the starting and
finishing frame if the user enters the series of frames needed.
Music
Nowadays musicians are using a special type of computer program called
MIDI(Musical Instrument Digital Interface) which permits a computer to control
synthesizers, allowing notes to be composed, edited, performed and mixed using a
computer.
MIDI also controls recording, sound processing equipment in studios and theatrical
lighting. Computers can also be used to play audio CDs.
Games
Most computer games were developed recently and makes use of simulation where a
computer uses graphics to simulate an action such as driving a car or flying a plane.
Other examples of computer games are: flipper, chess, bow and arrow and hand held
Nintendo.
Education
Computers are used in educational institutions like schools, colleges and universities
for educational purposes like learning computer science and other subjects like
maths, science, engineering etc and other functions like budgeting, inventory control
etc.
37
Advantages of CAL
(a) gives immediate and individual feedback on exercises presented
(b) can vary pace of teaching or training to suit individual needs
(c) learning is interactive thus it is more interesting and motivating
(d) never gets tired, bored or annoyed
(e) can be work or be used any time anywhere unlike human teachers or trainers
Disadvantages of CAL
(a) CAL systems are currently expensive
(b) cannot offer any additional explanations besides that programmed
(c) there is no human interaction
38
Social and economic implications of the use of computers
These are effects on people and organizations and associated directly with application
of computers and effects to the society in general.
Social implications
Deskilling
The replacement of skilled and semi-skilled labour by micro-processor controlled
systems in manufacturing
Electronic scabbing
A process that allows managers to switch word-processing duties from striking
workers in one country to non-striking clerks in another
Strike maximization
A situation where workers or trade unions are able to maximize the strike impact
by selecting computing staff for strike action
Pornography
Distribution and viewing of pornographic material on digital CDs and on the
Internet
Cost
Computers cost considerable amount of money for purchasing, maintenance and
consumables hence some small and indigenous companies cannot afford to
purchase and use computers
Technical manpower
The introduction of computers requires technically competent and qualified
personnel to use and run the computers
Greater productivity
Enabled through new technology and better working conditions
Computer crime
39
The introduction of computers led to a number of computer-related crimes with the
most common ones being as stated below:
40
DATA PROTECTION LEGISLATION (LAWS)
The development and widespread use of computers led to the some computer-related
problems as detailed above and because of such problems, laws were passed in order
to curb some of the problems.
NOTE: Personal data of individuals can be held on different databases such as:
National Social Security Authority
Electronic Voter Register
Banks’ database
Credit shops’ database
Licensing databases for TV, radio and drivers etc
Hospitals and doctors’ private surgeries
(a) Copy software for any purpose other than that specified in the licence
(b) Load and install pirated software
(c) Distribute pirated software electronically whether on the Internet or other
networks
41
NOTE: under this act, software developers are protected for 70 years from the date of
software release.
Data security
Is keeping data security safe from the various hazards to which it may be subjected
such as:
Deliberate data alteration for purposes of fraud can be as a result of hackers who may
be working from outside or in conjunction with some inside employees.
Computer security
Is concerned with taking care of computer hardware, software and data .
42
Accidental destruction Backup using file generations
Virus Use of up-to-date anti-virus software
Unauthorized entry into Biometric identification i.e. fingerprint
computer rooms recognition techniques, voice recognition and
face recognition
Electronic cards or badges(aka access cards)
Note:
file generations refers to the successive versions of backup files using the
grandfather-father-son concept.
Encryption is the coding or scrambling of data from ordinary format called
plaintext to a coded format called ciphertext so as obscure it’s meaning to anyone
who is not the intended recipient of that information.
SEE.Y
OU.TO
NIGHT
.AT.8
Virus
Is a program that attaches itself to other programs and replicates. Some viruses may
be harmful but others may be harmless but only annoying. Harmful viruses may
delete data or format the hard disk, alter data, disable keyboards or disk drive etc
Mellisa
Ripper
Jerusalem
Ping pong
Data crime
43
Ways of protecting computers against virus attack
Installing anti-virus programs with shields to scan and inoculate all diskettes
and hard disks e.g. Norton Antivirus, Dr Solomons Toolkit, F-Prot, MacFee etc
Installing firewall to scan all incoming e-mail traffic and Internet
communications
Disallowing all outside (foreign) diskettes
Using disc-less work stations
Buying original software
Data integrity
Is the correctness of data when it enters or leaves the system. Data may become
incorrect, corrupt as a result of one of the following actions:
Data privacy
Is keeping sensitive, confidential or personal data secure from illegal access by
persons who are not entitled to that information. Normally strict passwords are used
to keep records or documents private.
The right to privacy is a fundamental human right thus people do not want their
personal records or data stored on computers to be accessed or disclosed to anyone
without their consent.
Various computer laws or Legislation has been put in place to enforce the issue of data
privacy.
44
Changes in the working environment and development of new products
46
Macro (Ref: Intermediate Information Technology GNVQ by S. Chacko et al)
Is a set or sequence of recorded button presses, keystrokes, commands, menu
selections and instructions that can be replayed with one single short key code.
When the macro is replayed, all the actions are repeated as if you were carrying them
out, but much faster and more accurately.
Uses of macros
Replace repetitive keystroke sequences
Create templates by setting page attributes and layout
Set defaults within software
Perform automatic calculations
To :
From :
Date :
Ref :
Subject :
Set defaults within the application software e.g. font type and size are already
set when you start MS Office Applications. Other defaults that can be set are:
Icons for printing, saving etc are simple examples of macros in the sense that they
represent a series of steps taken when using the menu bar to click on File, select
Print, etc thus they are macros themselves because they are a quicker alternative to
selecting commands. However macros can be recorded to carry out more complex
macros.
47
Macros are similar to functions in that they can take arguments and in that they are
calls to lengthier sets of instructions.
However, unlike functions, however, macros are replaced by the actual instructions
they represent when the program is prepared for execution; function instructions are
copied into a program only once.
Designing a macro
It is important to plan the design of a macro by producing a specification which
include:
Software to be used
In most software packages, macro recording and playing is found under Tools or
Utilities menu)
Purpose of macro
Uses of macro
Method of execution e.g.
pressing function key or short-cut keys,
clicking button icon
choosing command from a menu
Embedded data(text or numbers entered into software automatically) e.g.
Company name and address
Telephone and fax numbers
logo
Layout style (house style for all commercial or individual documents)
How the macro will be tested e.g. testing the macro using short-cut keys,
selecting menu option or pressing command button.
(see page 100 for an example of macro design specification, Intermediate Information
Technology)
48
4.2 SYSTEMS ANALYSIS AND DESIGN
Is a series of stages or phases that you go through when developing a system from
selecting a topic to review and maintenance?
System
Is a set of interrelated entities which interact in such a way that they act as a whole to
achieve a common goal.
Information system
Structured and organized set of people, procedures and equipment designed to gain
better control of the business by accepting data and processing it to produce
meaningful information that will be used by strategic decision makers at all
management levels.
Under such circumstances, the management appoints a project team led by a project
manager or systems analyst. The management set out the Terms Of Reference (TOR)
specifying project objectives, time and resource limits.
1. Problem definition/identification
2. Feasibility study
3. Investigation(fact-finding)
4. Analysis
5. Design
6. Development (programming/coding)
7. Implementation
8. Reviews and Maintenance
The system analyst will make proposals of solutions to the problem which must be
proven feasible (achieavable). The preliminary study may reveal that a new system is
not necessary and the current system is good enough.
Technical feasibility
This is where the technical team establishes whether the organization will be able to
acquire the following:
Technology required e.g. computers , printers , modems
Technical expertise is qualified and competent personal to use and manage the
proposed system.
Will the proposed system meet the organizational objectives
Economic feasibility
Is concerned with consideration of whether the organization will be able to meet the
following costs:
Development cost
Running cost
Equipment purchasing costs
50
Economic feasibility looks as to whether the system will bring about savings
(cost/benefits analysis)
Social Feasibility
Is concerned with the effect on current employees and customers.It looks on whether
the proposed system will lead to:
redundancy(loss of jobs) or retraining of employees
retraining of the employees
redeployment to other non-critical positions
Operational feasibility
Involves consulting users to see if the proposed system fits into the current operations
and to see if the proposed system satisfy the set objectives.
Using the above report, the management will then decide on whether to proceed or
not.
Investigation(fact-finding) stage
Is a detailed or in-depth study of the current system covering:
The above which will help the analyst to get a better understanding of the existing
system thus have a better view of areas which needs attention or improvement.
Interview
A face-to-face personal discussion between the analyst and users or other persons
involved in the use of the current system in order to establish and verify facts on the
current system.
51
interview details can be taken by writing short notes or filling in the check list or
tape recording but only after getting interviewee permission.
the interview should be well planned and consideration given to factors such as
who to interview, when to interview and what to ask etc
In-order for the interviewees to express views freely, interviews should be held in a
private setting
Questionnaires
Is a document with carefully planned questions meant to capture as much information
as possible that may be necessary for the project which will be analysed later on.
Are useful where information is gathered from a number of people and questionnaire.
The analyst should prepare the document ad consider the following aspects:
Questionnaires should be structured to get both facts and opinions that are necessary
for the system e.g.
Question: “How many students do you register per day?” is a question that calls for a
straight answer(fact)
Question: “What do you think is the reason/cause for high rate of transfer?” is
question that calls for an opinion.
Observation
Is where the analyst studies users of the current system whilst they are in action so as
to get a better understanding of the procedures.
52
Normally the analyst uses participant observation i.e. observing by doing so that there
won’t be a shift in behaviour. Workers normally work much faster and efficiently if
someone is watching them thus the observer may be misled.
The analyst must inform users of the observation and its purpose so that they won’t
mislead him/her in their actions. Notes can be taken by writing or video taping.
Program flowchart
Is pictorial diagram which is used to show the logical structure of the computer
program which is normally written first before the actual program.
Represents a process
53
Represents a decision
54
start
Input customer
details
YES
Is
customer
registered
NO
Display results
end
55
Systems flowchart
Is a diagrammatic or pictorial representation of a complete data processing system
showing an overview of all procedures both manual and computerized excluding
details of programs.
Decision tree
Is an analysis tool which has an upside down tree structure which branches outwards
depending on options available. It presents information in a much clearer manner.
Discount Policy
Members Non-members
15% 10% 5% 0%
56
Decision table
Is another analysis tool that shows actions to be taken for different combinations of
conditions. A decision table has four components(quadrants) as below:
Note:
Conditions : contain all possible conditions
Condition entries : show whether condition is true or false
Actions : contain all possible actions
Action entries : indicate whether action takes place or not
1 2 3 4 5 6 7 8
Customer already registered Y Y Y Y N N N N
Customer provide identification Y Y N N Y Y N N
Customer restricted/blacklisted Y N Y N Y N Y N
Register customer - - - - - X - -
Do not register customer X X X X X - X X
requested courses
Course File
Student Verify
availability
_________
Course Course
Details Enrolment
Reject Accepted
Regret
letter
Acceptance
letter
Student
58
Pseudocode(structured English)
Is a series of structured English-like statements which is an intermediate stage
between the programming language and plain ordinary english stating the order in
which operations are performed for solving a problem.
Example of pseudocode
for a video rental shop discount policy explained already:
Data dictionary
Is a database of all data items in the system together with the exact and complete
definition of each item. This is important if meanings of the words are to be used
consistently by various people who deal with the system.
Note: layout and structure of data dictionary may vary slightly but generally should
contain information as in the above example.
Design stage
Is where the analyst makes the proposed/new or intended system or application to
meet company data processing objectives using various design tools.
Output design
Usually this part is mainly the design and layout of screen and printer reports.
Processing design
This aspect involves design of steps that link everything together to produce the
desired output. This involves both computers and clerical procedures starting from
origination or collection of data to distribution of output.
input forms
report layouts
file organization and access methods
processing methods
Security facility
This is concerned with how data can be protected from intentional(deliberate) or
accidental loss of data be as a result of hacking, viruses, accidental deletion etc.
Passwords and access levels can be designed specifically who should access which
data and activities that he/she can do e.g. a junior clerk can not have right to transfer
company funds or view a file that contains directors salary except the Accountant or
salaries manager.
Development/construction stage
Is the actual process of programming or coding the application designed and specified
in the design stage. This stage is done by programmers using an agreed programming
language such as Visual Basic, C++, COBOL, Pascal etc or 4GL such as MS Access,
dBase etc.
60
Technical documentation
manual meant for personnel such as programmers and analysts with details that will
be used for system maintenance, modifying or upgrading and correcting errors. It
consists of :
program listing
algorithms
flowcharts and dataflow diagrams
file structure
list of variables (data dictionary)
instructions on modifying the system
User documentation
manual meant for various levels of end users from data capture clerks to managers
with details on how to operate the system i.e. :
Operator documentation
manual meant for anyone who concerned with the day to day operation of the
computer system and usually specifies the following:
Installation documentation
Is manual with details on :
Implementation stage
Is a stage which involves the set up of hardware and installation of the developed
system. It has 4 main components:
61
(a) Setup and installation of computer hardware such as computers and printers
(b) Installation or loading of the new system
(c) Training users on using and operating the new system
(d) Testing of the new system
(e) Changeover or conversion plan
Managers
System testing
After development the system has to go under live industrial testing to detect and
flaws before being released for use. The testing system may typically consists of the
following stages:
62
This is when all modules and subsystems are integrated and tested as a single
system and may detect errors that may be as a result of fault interfacing between
modules. This is when its verified whether its meeting the original specification
Types of testing
Beta testing
Testing of new packages developed for commercial release on a large scale where the
system is given to a number of potential users who agree to use the system and report
the problems to the developers. This process help detect errors that developers may
have overlooked.
For both types of testing, if errors are detected, the system is then modified.
63
METHODS OF SYSTEMS CHANGEOVER
For example, if a hospital has an integrated system with various modules for all its
departments, the project team may first of all introduce the patient registration
module, if runs well then they may introduce the admission module, if it runs well
then they may introduce the pharmacy module, if it runs well they may introduce the
out patient module and so o until all modules have been introduced.
Pilot changeover(conversion)
This is also mainly used in large systems of very large organizations with branches
where the system is first implemented at one of the branches where a trial run or live
testing is done for a period of time.
For example, Edgars Limited might have a trial run of a new system at their Harare
First Street branch and If the system proves to be working well, the system can then
be introduced in other branches across the country.
64
Advantages of pilot changeover:
control can be exercised as the system is introduced by means of trial run at
one branch or site
problems can be easily identified and rectified without affecting entire group
business operations
65
4.3 Problem solution including algorithm design and programming concepts
Program
Is a set of computer instructions written in a particular programming language to
perform a specific function.
Visual Basic
Pascal
COBOL(Common Business Oriented Language)
C++
Java
LOGO
LISP
FORTRAN(Formular Translation)
Constants
Are values that do not change during data processing e.g. the Pi = 3.141 can be a
defined constant which maintains that value.
Variable
Are values that change during the process of running the program or data processing
e.g. the average of student mark can change as more marks are added or removed.
Local variables
Are values that are used or known in a particular program or module.
Global variables
Are values normally accessed or used by a number of modules in a program and
normally defined in the main program and not in modules.
Module
Is a set of instructions for performing a specific task which will then be incorporated
into the main program e.g. an accounting system might have the following modules
journal, purchases, sales, cash book etc
NOTE: Rogue value terminates data input loop and not the program.
MODULAR PROGRAMMING
Is the breaking down of a large task into small self-contained tasks which can be
developed and tested separately and then incorporated into the main program.
Top-down design
Is an orderly approach to programming which gives an overview of a program
structure by breaking down a large task into successively smaller ones until they are
simple enough to be coded as self-contained modules.
S tu d e n t
R e g is tr a tio n
S y s te m
A dd E d it B ro w se B ackup R e p o r ts E x it
R e co rd s R e co rd s R e co rd s R e co rd s
Tape CD P rin te r S c re e n
67
Program test data
After a program has been developed it has to go through a rigorous testing process by
all possible values to try and check if all necessary validation checks have been
applied to trap errors. The three types of program test data are:
Standard data
This is data that is of the correct data type and within the correct range e.g. for the
field Form: digits 2 to 5 would be the standard data. For the field surname: “Moyo”
would an example of standard data.
Abnormal data
Is meaningless or nonsensical data for a particular field e.g. where age is required a
name would be an abnormal entry, where a name is required, date would be
abnormal. Data outside the range can also be abnormal e.g. –8 for field of Form is
abnormal.
There are three basic programming constructs used to develop a program as below:
Start
Statement 1
Statement..
End
Main selection structures are built or developed using the following reserved words:
Assume you have a menu driven program as below with a number of options. The
execution of modules can be controlled using any of the two selection control
structures.
68
System Menu
1. Add records
2. Edit records
3. Print records
4. Quit
It is more compact
It uses less programming statements
CLS
INPUT “Enter your age: ”, age%
IF age% > 18 THEN
PRINT “You are an adult”
ELSE PRINT “You are still a minor”
ENDIF
The number of repetitions can be known in advance and if the number of repetitions is
not known in advance a rogue value is used to terminate further input.
FOR …NEXT
REPEAT …..UNTIL
WHILE ….WEND
DO …. LOOP
69
Simplified example of REPEAT …UNTIL
REPEAT
Enter student mark
UNTIL mark = -1
FOR counter = 1 to 5
Enter name
NEXT
Counter = 0
WHILE counter < 5
Enter name
WEND
Counter = 0
DO WHILE counter < 10
Enter name
LOOP
TRUE
Statement 1
Decisio Decisio
n NO n
Statement 2 conditio conditio
YES FALSE
End
70
TYPES OF PROGRAM ERRORS
Logic errors
These errors violate the program logic and thus produces wrong results even if the
program runs perfectly. Good examples of logic errors are:
Division by zero
Wrong formulas e.g. converting 15 metres to centimeters: metres = 15 / 100
(Wrong because, you multiply by 100 not divide)
Runtime errors
These are errors that are detected during program execution. A compiled program can
still produce runtime errors which causes abnormal program termination.
NOTE:
A bug is a program error. The process of removing program errors or bugs is called
debugging. The process of following the flow or logic of a program and working out
manually using trace tables is called dry running a program.
Semantic errors
Are errors that violate rules of a programming language.
71
4.4 Generic software and the organization of data
Generic software
Is general purpose software or packages that can be used in different situations to
accomplish different things e.g. MS Access, MS Word, MS Excel etc.
Database
Is an organized and structured collection of related data files e.g. supplier and
customer files, student and staff files at a school etc
Relational database
Is a database model where contents of files are connected together by common field
names and data is held in a number of interrelated files.
This model uses tables called relations i.e. arrays of rows and columns of data where
rows are records of individual records and fields are fields of data. Data can be
accessed much faster by random requests through the use of a key field.
A single table of database file is called a flat file. The following is an example of a
relational database model/schema:
Use linked lists idea where links between records are established through the use of
pointers i.e. addresses of related data. Below is the model diagrammatically:
72
Teacher X Teacher Y Teacher Z
3A 3B 3C 3D 4A 4B 4C 4D
Hierarchical database
Has a top-down or branch arrangement. It takes the form of an inverted tree structure
where the first point is called the root from the main trunk and branches develop.
Example of a hierachical database model diagram is as below:
73
DBMS Languages
Use a number of languages to perform some of its functions. Main languages are as
below:
Note:
Database Administrator(DBA)
Is the person in charge of database design, maintenance and overall running of the
database. Duties of the DBA include:
designing database
deciding database contents
deciding storage of data
deciding backups and recovery procedures
Data dictionary
A description of data items provided by the DDL i.e. ‘data about data’. The
database dictionary normally has details on logical database, physical storage
devices, validation used and recovery procedures.
File manager
Part of the operating system which allows access to data stored on disk and acts
as an interface between data stored on disk and the user.
Logical file
Refers to actual file records
Physical file
Refers to the actual file records when stored on physical storage media.
74
Character
The smallest unit of data in a database file e.g. a single letter or digit
Field
A column of related data characters in a record e.g. surname, date of birth
Record
A collection of related fields in a database file e.g. details such as student number,
surname, first name, date of birth etc for a single person.
File
A collection of related records e.g. all student details or records make up a student file
Database
A structured and organized collection of related data (files)
Table
Set of related data arranged in rows and columns(NOTE: it is the same thing with file)
Queries
A query is a search condition used to select specific records from a given database file
e.g. a query to select all form 3 students from a school database file would be:
Form = 3
Using the database file above, below are examples of queries to select the following:
75
(a) all girls : Sex = “F”
(b) all students from Harare : Hometown = “Harare”
(c) all form 5 students : Form = 5
(d) all form 5 boys : Sex = “M” AND Form = 5
(e) all boys or those in Form 5 : Sex = “M” OR Form = 5
(f) all students who paid less than $2 400 000 : Fees Paid < 2400000
(g) all those who paid $2.4million or above : Fess Paid >=2400000
(h) all students born before 1 January 1988 : DOB < 01/01/88
NOTE: - The following applies to MS Access 2000 database and may not work in some
database packages.
for queries using a text(character) data type, use the search string in double
quotes e.g. Surname = “Musonza”
for queries using a numeric(number) data type, use the signs(<, >, =, <=, >=)
plus digits with no double quotes e.g. Form = 5
for queries using a date data type, use the signs(<, >, =, <=, >=) plus the date
with no double quotes e.g. DOB > 31/12/88
Primary key
Unique field used to identify a particular record in a database e.g. student number,
bank account number, credit account number etc. In the above database file, the
primary key would be the student number since each student is assigned a different
and unique identification number.
Secondary key
An alternative field used to identify a particular record but not necessarily unique e.g.
surname. Surname cannot be used as a primary key because of its possible for two or
more people to have the same surname.
Appending
This refers to the addition of new records at the end of an existing database file e.g.
adding new comers to a school database file or adding new customers to a customer
database file.
Amending
This refers to modifying existing records when circumstances change e.g. changing the
address of a student if the family moves to some new home.
Deleting
This refers to removing or erasing ‘dead’ records i.e. records which are no longer
necessary to the database file e.g. records of students who have transferred, students
who have finished school or students who have died.
Inserting
This is similar to appending but differs in the sense that with inserting records, you
will be placing new records between specified records and not necessarily at the end of
an existing database file.
Browsing
This refers to viewing, scanning or simply going through records whilst on the screen.
76
Displaying
Simply means showing records on the screen without printing them.
(a) text (or character) – this is data made up of letters of the alphabet only e.g.
Kutama College or a combination of letters of the alphabet plus other
characters e.g. 3D.
(b) number (or numeric) - this is data type made up of signed digits 0 to 9
inclusive, with or without a decimal point
(c) date – this is date data type either in short British date format or American
format as dd/mm/yy or mm/dd/yy. By default, date normally has fixed length
of 8 spaces. May be set to long date format: dd/mm/yyyy or mm/dd/yyyy
(d) logical – this is data type made up of only two possible values either true or
false(normally represented by T for true or F for false(Normally has a fixed
length of 1space).
(e) Currency – for all financial figures with two decimal places
(f) Memo – this data type is normally in alphanumeric form and reserved for items
like address or comments which take more space and cannot be sorted on.(Has
a fixed length of 10 spaces in most database packages)
NOTE: Alphanumeric data type refers to data with a combination of letters plus
digits. In MS Access, if a field contains a mixture of digits, letters or other
characters it automatically becomes text data.
Field name
Is a name that identifies a specific field which should give a rough meaning or idea of
the type of data stored e.g. price, surname, student number etc.
Field length
Is the maximum number of character spaces that a field should carry and normally it
should be long enough to accommodate the longest possible entry in that field.
String
Is a list of keyboard characters e.g. ‘I am in Form 4’. May be referred to as
alphanumeric data.
77
Spreadsheet
Is an application package made up of a grid or array of cells mainly used for business
calculations.
Uses of spreadsheet
(a) Financial and cash flow analysis
(b) Creating business plans
(c) Sales forecasting and analysis
(d) Creating business budgets
(e) Preparing financial statements
Cell
Is an intersection of a row and column
78
Label
Any textual data made of letters of the alphabet only or combination of both letters
and numbers e.g. headings, titles. Labels cannot be manipulated by formulas are are
left aligned by default.
Value
Any numerical entry i.e. data in form of signed digits 0 to 9 inclusive with or without a
decimal point. Values can be manipulated by formulas and are right aligned by default
Example 1: spreadsheet used to calculate selling price, total sales figures etc.
A B C D E F G
1 ITEM COST PRICE MARKUP(60%) SELLING PRICE QUANTITY TOTAL COST TOTAL SALES
2
Note: For percentage formulas you can also use the following format:
Example 2: Spreadsheet used to calculate net gross salary, deductions and net salary
of employees at a company
A B C D E F G
1 Employee Basic Allowance Overtim Gross PAYE(21%) NET
Salary s e Salary SALARY
2
3 JOHN $500000 $450000 $20000 =SUM(B3:D =21% * E3 =E3-F3
0 0 3)
4 MARK $640000 $600000 $14000 =SUM(B4:D =21% * E4 =E4-F4
0 0 4)
5 SHELLY $410000 $230000 $40000 =SUM(B5:D =21% * E5 =E5-F5
0 0 5)
6 SIMBA $920000 $800000 $23800 =SUM(B6:D =21% * E6 =E6-F6
0 0 6)
7
8 TOTAL =SUM(E3:E =SUM(F3:F
6) 7)
79
9 AVERAG
E
=Average(B3:B6) etc
80
Word processing
Is the typing of documents using computer technology loaded with specialist word
processing packages such as MS Word 2000. This involves text entry, formatting,
editing and storage.
Word processor
Is a specialist computer or package dedicated and used for only one task of word
processing.
MS Word 2003
Word Perfect 5.1(and 6.0)
WordStar
AmiPro
WordCraft
Multimate
Displaywrite
Document
Is anything that can be typed e.g. letter, memo, report etc
Formatting
Is adding or applying style to documents to improve appearance such as emboldening,
italicizing, underlining, text alignment text rotation and changing font size, type and
colour.
Editing
Is manipulation of documents such as making corrections, deletions, additions or
insertions of text to existing documents.
Title bar
A bar on which the file name of the document appears after saving
Menu bar
A bar that offers options such as ‘File Edit View Insert Format Tools Table Window
Help’
Tool bar B I U
A bar that contains various icons e.g.
Window
An area on which text can be typed and viewed
(a) Ability to edit documents on screen without retyping the whole document
(b) Ability to automatically check and correct spellings and grammar using the
spell and grammar checker
(c) Ability to format documents i.e. applying style to improve document appearance
(d) Ability to save, electronically file and retrieve documents
(e) Ability to print many copies from one document
81
(f) Ability to insert tables, diagrams and pictures
(a) Page break - a forced end of page which is done by pressing Control and Enter
keys simultaneously
(b) Hard return – is when the cursor(aka blinking underscore) is moved to the next
line before reaching the right margin after pressing Enter key
(c) Soft return – is when the cursor(aka blinking underscore) moves to the next
line automatically after reaching the right margin without pressing Enter key
(d) Widow - part of a sentence left at the bottom of a page if the sentence goes on
to the next page
(e) Orphan - part of a sentence that goes to the next page if the sentence cannot fit
at the end of the previous page
(f) Header – words that are inserted or typed to automatically appear at the top of
every page of a given document
(g) Footer - words that are inserted or typed to automatically appear at the bottom
of every page of a given document
(h) Footnote – text printed to offer an explanation at the end of a page to a word
that appears on that particular page(e.g. in Shakespearan plays)
(i) Endnote - text printed to offer an explanation at the end of a document for
words that have been appearing throughout the document e.g. in some Bibles
(j) Subscript – characters printed slightly below the normal print line e.g. in H 20,
the digit 2 is the subscript
82
(k) Superscript – characters printed slightly above the normal print line e.g. x 2, the
squared(2) is the superscript.
(l) Type face – is the font type i.e. style of font such as Times New Roman,
Bookman Old Style etc
(m) Tab – is short for tabulator stop i.e. one stop jump along the ruler that moves
the cursor by using the tab key
(n) Indentation – is starting the paragraph one or more tab stops inside the default
left margin setting by using the tab key.
(o) Margins – are settings that define the window on which one types text by
marking the top, bottom, left and right margins.
NOTE: to reverse the action, highlight the text and click on the same icon.
Inserting tables
Click where you want the table to appear
Click on table on the menu bar
Choose insert table
Enter the number of columns and rows
Click OK
83
Inserting pictures
Click on Insert on the menu bar
Choose picture
Choose ClipArt
Select the picture that you want
Click insert or press enter key
Find What:
Replace with
Spacing
Highlight or select text
Click on format on the menu bar
84
Choose paragraph
Choose appropriate spacing e.g. single, one and half, double etc
Click OK
Mail merging
Create the standard document
Click on tools on the menu bar
Choose mail merge
Choose create main or standard document
Choose ‘get data’ option
Click merge
Creating columns
Highlight paragraph
Click format on the menu bar
Choose columns
Select appropriate column structure
Click OK
Thesaurus
Click on tools on the menu bar
Choose language
Select thesaurus
Click OK
Saving a document
Click on file on the menu bar
Click on save
Type appropriate file name
Click OK or press enter
85
Printing
Click on file on the menu bar
Choose print
Enter number of copies
Click OK
Print preview
Click on print preview icon on the tool bar
Click close
DTP(Desktop Publishing)
Use of graphics, charting and page make-up software with high quality output in
typesetting, design and producing documents in style e.g. magazines, newspapers,
manuals, posters, brochures and pamphlets.
Application of DTP
Advertising agents in producing various adverts
Printing and publishing houses for producing magazines and pamphlets
Press co-corporations for publishing newspapers e.g. at Zimpapers
Other private companies or users for producing posters, in-house magazines,
notices etc
DTP Package
Is a graphics, charting and page make-up program with high quality output for
producing documents in style e.g. magazines, newspapers, manuals, posters and
pamphlets.
Text
Can either be imported from a word processing package or typed using the DTP
package. Text style can be improved by rotating, enlarging, changing colour etc
Pictures(graphics)
Can be inserted in a DTP package by either:
Importing from ClipArt gallery(library of various pictures)
Scanning using a scanner
Uploading from a digital camera
Borders around graphics can be inserted and can graphics can also be zoomed,
rotated, changed colour etc.
86
Columns
Allows division of paragraph on the page to facilitate continuation of text from the
bottom of one column to the top of the next column
Page view
A facility for preview document before printing by viewing scaled down, zoomed or
specified parts of a document
Graphics Packages
Fall basically into the following two categories:
Painting packages
Are meant for artists or graphic designers for production of creative visual designs e.g.
MS Paint Package for producing free-hand sketches
Drawing(Design) Packages
Have a technical nature and with controls over facilities of scales and dimensions e.g.
Auto CAD used in producing engineering diagrams.
File
Is a collection of related data records.
Master file
Is a file that contains data of a permanent nature against which transaction files are
used to update it e.g. permanent customer details such as home address, work
address, ID numbers etc.
Reference file
Is a file that contains data for use in performing a transaction e.g. price lists, pay rates
etc.
87
Temporary file(aka scratch file)
Is a file which is automatically generated during file processing and no longer
necessary.
Backup file
Is a file which is simply a duplicate or copy of the original file which is used to recover
or restore data in the event of accidental data loss or theft.
For back up systems, the common method used is that of file generations explained
below.
File generations
Successive versions of backup files using the concept of grandfather-father-son where
the latest version is called the son, the one before it is called the father and the one
before the father is called grandfather.
Sorting
Arranging data or records in a desired predetermined order e.g. ascending or
descending order.
Bubble sort
Quick sort
Insertion sort
Shell sort
Merging
Is combining two or more files in the same order by interleaving their records to form
an ordered file e.g. (Note: File 1 and File 2 must be in the same order)
File 1 : 2 4 5 18
File 2 : 1 6 9 15
New merged file : 1 2 4 5 6 9 15 18
Concatenation
Is simply two files together with no attention being made to order e.g.
Example 1
Text A : ‘Brendon’
Text B : ‘Musarurwa’
A + B or A and B : Brendon Musarurwa’ NOTE: This is concatenated
text.
Example 2
File 1 :3 1 6 5
File 2 :9 4 10 8
Concatenated :3 1 6 5 9 4 10 8
89
FILE ORGANIZATION AND ACCESS METHODS
SERIAL ORGANIZATION
Record organisation
Is a file organization system in which records are written on the tape one after the
other in order of entry.
SEQUENTIAL ORGANIZATION
Record organisation
Is a file organization system in which records are written on the tape in a
predetermined order e.g. alphabetical or ascending order.
Record organisation
Is a file organization system in which records are stored in some predetermined order
and an index or key field is added to each record to allow it to be read directly e.g.
storage of data on CD.
Record organisation
Is a file organization system in which records are stored on magnetic disks such as
diskettes or hard disk without any order(randomly) and make use of an index or key
field to retrieve a record without going through all other records.
Random file organization has the fastest method of data retrieval that’s why it is
suitable and used for online and interactive systems where data is processed and
results produced instantly.
90
Addressing records for direct access (ref GCSE Computer Studies)
An address can be assigned by one of the following:
Directory
Key transformation
Key transformation
An algorithm is applied to the key to transform(change) it to a file address. The most
common method is to divide the record key by a prime number corresponding to the
number of storage locations to be used.
The remainder is used as the address for the record e.g. with 7 records, 11 locations
numbered 0 to 11, keys 3, 12, 21, 39, 44, 60, 62.
The first record with key 3 is divided by 11 giving 0 remainder 3. This is placed in
location 3. The second record with key 12 divided by 11 gives remainder 1 and goes
into location 1, the process continues.
91
4.5 Hardware, systems and communications
Data capture
and input
collection
Add details
Data verification
Is checking for correctness of data i.e. errors like transcription or transposition of
figures, totals etc by repeating keyboard operations i.e. entering data twice and
comparing results.
If the results are the same, data is assumed and verified to be correct and if there is a
difference then an error is signaled.
Data validation
Checking data on entry to see if its sensible, reasonable, realistic or meaningful e.g.
where age is required, a negative number becomes invalid entry, where name is
required, a number would be invalid.
Range checks
assigning of lower and upper limits i.e. minimum and maximum entries e.g. for date in
dd/mm/yy format:
Day : 1 - 31
Month : 1 - 12
Form : 1 – 6
Presence checks
Where an empty entry would be trapped and program will not proceed until an entry
has been entered.
age numeric
surname text
date date
92
Input devices
Are peripherals that are used to enter data into the computer in computer-readable
form.
Advantages of OMR
Faster data entry
No need to manually key in data
No verification is needed
Disadvantages
Can only read limited characters
May read data wrongly e.g. where a handwritten letter ‘S’ is similar to digit ‘5’
The MIC Reader cannot read handwritten amounts, so the amount withdrawn is first
typed and printed on the cheque in magnetic ink before it can be processed.
93
Sample cheque
Pay_________________________________________________________Duty Paid
or order
Sum of ____________________________________________________________
__________________________________________________________________
__________________________________________ $
_____________
Mr J. Huggins
A B C D
Note: the order of numbers can change or vary from bank to bank
System is robust i.e. cheques can still be read even if the cheque is folded, dirty
or when MICR numbers are written on.
System is difficult if not impossible to forge
System is accurate i.e. human clerical and arithmetic errors are eliminated.
product description
price.
Bar code
A bar code is a series of black and white vertical lines of varying thickness that
represent a unique code for a particular code.
Laser scanner
Light pen
Hand-held wand
If the bar code reader fails to read the bar code, the till operator may:
Cannot be used on all products e.g. may not be used on meat, vegetables or
fruits
Cannot be used on very large items or very small items e.g. cars, beds, needles,
pins etc
Does not show the price hence customers may not be willing to purchase the
products
Note: Actual number of specific digits for each item may vary e.g.
2 5 5 1 or 3 4 5 1
company code
product code
Scanners
Are devices used to copy text, diagrams and pictures into the computer where they can
be altered. Scanners are mainly used in DTP to copy documents and pictures.
Touch-sensitive screen
Allow the computer to be operated by operated by pointing or touching the icons or
menu which will be executed. The touch-sensitive screen can either have:
touch-sensitive membrane
grid of infra-red light
When one touches the screen, the infra-red beam membrane is interpreted and action
at that point is executed. In Zimbabwe, touch-sensitive screen are used on some ATMs
especially Trust Bank(currently under curatorship)
95
Keyboard
Is the standard input device with a ‘QWERTY’ layout similar to that of a typewriter. It
has additional keys such as Esc, function keys, cursor control keys etc.
Main disadvantages
Can only allow entry of text data and not pictures
Speeds varies and depends with the typist
Mouse
A small hand-held device with a ball fitted underneath. When the mouse is moved on a
flat surface, the ball rolls and a signal created and transmitted to the computer. The
computer controls a pointer on the screen which moves in a direction corresponding to
the direction of mouse movement.
Advantages
User-friendly as non-specialist can use the mouse
No typing skills are required
Trackball
Similar to a mouse but has a roller ball on top instead of underneath as on a mouse.
There are buttons next to the roller ball that have the same function as mouse
buttons. Trackballs are mostly used on laptop computers and Personal Digital
Assistants(PDAs) i.e. very small hand-held computers.
Microphone
Is used as an input device for computerized music recording, and a limited vocabulary
in voice recognition system such as those used in attaching voice tags to voice dialing
systems.
Its difficult to fully utilize voice input because of the difference in accent, tone and
language.
Light pen
Pen-shaped device with a light sensor such that when its moved closer to the screen, a
character or object is detected and can be moved to create or modify graphics.
Graphics tablet
Consists of touch-sensitive flat membrane called graphics pad. The user can place a
diagram on the surface and then use a normal pen or pencil to draw on paper and the
diagram will be transferred automatically into the computer(tracing concept).
A grid stylus is normally used to control and write on the touch-sensitive screen.
96
Sensors
Are electronic devices used to collect continuos or variable data from the environment
e.g. temperature, light, pressure, humidity, pH and oxygen levels etc. Sensors
normally produce a voltage which must be converted to a digital signal using the
Analog-to-Digital Converter(ADC).
Digital camera
Takes pictures and enters them directly into a connected computer or alternatively
stores the picture in digital form on RAM installed on the camera. A digital camera is
different from an ordinary camera that store image on the film.
Joystick
Is made up of one or two gear shifts known as pots used for playing computer video
games on a TV set or computer.
The pots produce voltages of between 0 and 5 when moved which are input onto the
computer. The voltages are converted by an in-built ADC to binary digits that can be
processed and executed by the computer.
Punched cards
Are simple cards with data encoded on a pattern of rectangular holes. The method is
slow, expensive and prone to errors (disadvantages). Punched cards are no longer in
common use today. They were mainly used in turnaround documents such as factory
time cards, electricity bills etc.
Note: turnaround documents are documents which are first produced as output and
later on used as input source documents e.g. statement with the following part that
reads:
“..tear off the part below and return it with your payment”
Terminals(aka workstations)
Is another input device made up of a keyboard and monitor at its simplest level. There
are basically three types of terminals as below:
Dump terminal
Is a terminal that consist of a VDU and keyboard with no attached processor used
only to enter data and display information from the main computer.
Smart terminal
Is similar to a dump terminal but have some limited amount of memory and
processing power(have own processor)
Intelligent terminal
Have enough processing power on their own such that they can full processing and
only send processed data to the host or central computer. Are mainly used in
network system (distributed processing)
Video digitisers
Are input devices that convert video signals into digitized representation in computer
memory. Are mainly used to capture single or multiple video frames for printing
pictures in magazines or TV adverts.
97
Magnetic stripe card reader
Are input devices with computerized scanning sensors used on ATM and credit cards
to scan for details on the black stripe at the back of the card and send the data to a
connected computer.
The magnetic card contain coded information which is read, input into the computer
and interpreted for a transaction to take place. Recent development include the smart
card which contains a microprocessor.
Key-to-disk
Is an input system in which data is entered and saved directly on magnetic disk.
Note:
Analogue data
Are continuous or variable magnitudes or quantities such as temperature, pressure,
voltage etc.
Digital data
Are a series of discrete binary digits of 1s and 0s.
Analogue-to-Digital Conversion
Is the process of changing analogue data(variable magnitudes) to digital data(discrete
binary digits) so as to be recognized and processed by the computer.
Most computers and peripherals are digital but some are not e.g. some sensors are
analogue devices which produce a voltage in response to temperature change and the
voltage is an example of analogue signal which must be converted to digital form for it
to be processed by a computer and this is done by the Analogue-to-Digital
Converter(ADC).
Analogue-to-Digital Converter(ADC)
A circuit that changes continuous or variable data such as temperature, pressure etc
to discrete binary digits(digital data).
Digital-to-Analogue Converter(DAC)
A circuit that changes digital data(binary digits) to analogue data (continuous or
variable data) such as temperature, pressure, voltage etc.
Digital-to-Digital Conversion
Is the reverse process of changing digital data(discrete binary digits) to analogue
data(variable magnitudes) that can be recognized by non-digital devices like actuators,
pumps, valves etc.
Note:
Actuators
Are output devices used by a computer to send a required action to a machine
attached to a computer e.g. computers operating actuators in washing machine
and chemical plants to open and close valves and pumps
98
Output devices(ref UNISA – Fundamentals of Computer Science Module)
Are peripherals that are used to display, print, present or produce output in human-
understandable form. There are two basic classes of output:
Hardcopy
These are printouts or printed information from printers or plotters that are
physical and tangible.
Softcopy
Refers to information that is not tangible nor physical e.g. displayed information on
the screen or sound from computer speakers
Printers
Monitors/screens/LCDs
Speakers
Plotters
Printers
Can be classified as:
Impact printers
Non-impact printers
Impact printers
These are printers that use mechanical force to hit characters on inked ribbons
against papers to produce text on paper.
Drum printer
Similar to the chain printer but has this one consists of a rotating drum where
letters are mounted.
99
Examples of non-impact printer
Inkjet printer
Operate by firing or squirting tiny droplets of ink through small holes called ink
nozzles. The ink is first heated and boiled in microscopic tube and then ejected by
steam pressure. Ink jet printers can print in colour or black and white e.g. the HP
Deskjet or HP Officejet range
Plotter
Is an output device used to draw high quality engineering or architectural
drawing on large sheet of paper such as building plans, electronic circuits,
town plans etc. The advantage of plotter is that it can draw on very large
sheets of papers
Drum plotter
Use a rotating drum or cylinder over which drawing pens are mounted. The
drawings are produced with a combination of drum and pen movement.
Flatbed plotter
Looks like a drafting table with mechanical pens suspended over them and
the pen movement is controlled by software.
Speakers
Are used as output devices for sound, music or speech
Monitor(aka VDU/Screen/LCD)
Used for displaying softcopy information
100
Storage media(devices)
Refers to various devices used to store data and programs before, during and after
processing.
Main memory
Consists of two basic classes ROM and RAM for holding data and instructions
before, during and after processing.
Non-volatile means that programs are not lost if power is switched off. The
programs in ROM are set or stored(etched) permanently during manufacture and
are said to be ‘hard-wired’ and often called firmware.
Volatile means that data is lost is power is switched off. RAM allows both the read
and write processes, and it is sometimes called semi-conductor memory. Some
RAM is powered by battery for the date and time to keep running.
Note: both DRAM and SRAM lose data if power is switched off.
Cache memory
Small high speed memory used for holding data and programs that are heavily
used. It acts as an intermediate storage between the CPU and the main memory
and it improves the overall speed of the computer because its closer to the CPU.
Memory Units
The smallest memory unit is the bit(binary digit) i.e. either a 1 or 0. In computers,
a 1 may represent or mean ON and a 0 may represent or mean OFF.
Word size
Is the number of bits that the CPU can process simultaneously. This is different
from data bus size which determines the number of bits transmitted at the same
time. Some PCs have 32 bits or better processors.
Magnetic disk
Has both sides coated with magnetic material and are able to store and retrieve
data using a read/write head. The two types of magnetic disk are:
Hardware component used to copy data to and from a diskette is called the disk
drive. Diskettes can be easily corrupted by excessive heat, dust and moisture.
Excessive heat
Moisture
Dust particles
102
Structure of a diskette
block
Read/write process
To read/write data, the disk goes through the following process:
Seek time
Time taken for the read/write head to move to the correct track
Search time
Time taken for the disk to rotate so that the data is positioned
underneath the read/write head
Read/write time
Time taken for the actual reading/writing of data
Therefore, disk access time = seek time + search time + read/write time
Note: all blocks on a disk hold the same amount of data, this means data is
more densely packed at the center and more sparsely packed towards the edge
Each surface is divided into concentric tracks and sectors. The intersection of a
track and sector is called a block and is the smallest unit that can be read or
written to. The internal structure is similar to that of a diskette.
103
Optical (laser) disks
Consists of the following:
VCD and DVD are new and recent developments which can store ordinary data,
sound and videos. CD-ROMs are similar to audio CDs and data is recorded on
them using high power infrared laser and read using low power
laser(photodetector).
Disadvantages of CDs
Recording structure of a CD
Is in the form of a spiral groove starting from the center progressing outwards. The
rotation rate of a CD is high at the center approximately 530 rpm and decreases
towards the edge to about 200 rpm(revolutions per minute)
Magnetic tape
Is made up of plastic stripe coated with magnetic material where characters are
recorded as a row of dots across the width of a tape representing binary bits. The
number of characters recorded on a given length of tape is known as packing density
and is measured in characters per inch(cpi). There are three basic types of magnetic
tapes as below:
104
Cassettes
Cartridges(tape streamers)
Open reel tape
Cassettes and cartridges are almost the same and cartridges are regarded as smaller
versions of cassettes. The main difference between cassettes and cartridges and open
reel tape is that cassettes are slotted into the tape slot(drive) but an open reel tape is
threaded(wound) onto a reel.
105
Magneto-optical disks
New development in storage media technology that combines technologies of magnetic
media and CD-ROMs to produce a disk similar to CD-ROM but with a difference in
that you can read and write to it and data on it can be erased.
Flash disk
Another new and recent storage media which is portable and removable with much
larger storage capacity than diskettes.
Operating systems
Are programs that manage the operation and running of a computer. Examples of
operating systems are:
106
Job
Is a data processing term for a package of work regarded by the computer as a
single unit e.g. producing a small report or full payroll. Once started, each
program will proceed automatically to completion.
Job queue
Is the order in which jobs are submitted for processing, however in some
systems priorities will override the job order.
Payroll processing
Where hours worked by employees are collected over a period of time(weekly or
monthly) and then used to calculate the wages for the workers.
Billing systems
Where readings for water, electricity, telephones etc are collected at the end of the
month and entered into a computer to calculate the monthly bills.
Credit systems
Where amounts spent over the month are collected together and then billed
together to produce a statement
Online system
Is where the input device e.g. workstation or ATM is directly connected to the main
computer such that data processing and updating takes place instantly. In contrast to
batch processing system, an online system is a system that provides for interaction
between the job and the user, which influence the future course of processing.
Offline system
Is a system in which the input device such as the terminal or workstation is not under
immediate control of the main computer i.e. not directly connected to the main
computer at that moment in time such that no transaction updating can take place.
107
All data entry will be made to disk or tape storage and later on uploaded when a direct
connection is made
Interactive processing
Is a system that provides the user with a dialogue platform, allowing data entry and
giving direct and immediate responses from the system e.g. requesting bank balance
on the ATM, airline booking system.
Centralized processing
Is whereby data from various company branches, departments or other remote sites is
sent to the Head Office or central data processing department in a raw state for input
and processing.
Distributed(network) processing
Is whereby data processing is carried out independently in more than location but
with shared and controlled access to common facilities and databases.
Real-time system
Is an online system in which the main computer is used to update data and produce
results that affect the next input from computer or non-computer equipment.
Multi-access(multiuser) system
Is a system that allows several users apparently to access, run programs and have
individual control of a central computer from various workstations which may involve
updating the same file.
Each user is allocated a time slice of the processor thus it is sometimes known as
time-sharing. The switching from one user to another is so fast and unnoticeable from
the user’s point of view.
Multiprogramming
Is a system that allows two or several programs to be processed apparently
simultaneously or concurrently but actually in bursts(switching) controlled by an
operating system such as Windows or Unix Operating Systems.
108
At any time, there will be several programs in memory all at different stages of
execution and again the switching from one program to another is so fast and
unnoticeable. For example, one program may be waiting for input, another using the
processor, another being saved etc and to control this process, priorities may be
assigned to jobs.
Multi-tasking
Is a system that allows several tasks or applications to be run simultaneously or
concurrently especially under Windows or Unix Operating Systems.
At any time, there will be several tasks in memory all at different stages of execution
and again the switching from one task to another is so fast and unnoticeable
Some operating systems do not support multi-tasking and these are called single-
tasking.
Multiprocessing
Is a system where the computer will be having more than one processor but still
sharing all or part of memory.
Control systems
Is a system in which one or more computers are used to control the operation of some
non-computer equipment usually involving some monitoring and physical quantities
for analysis.
Feedback and timing are critical considerations and at times. Such control systems
are referred to as real-time control systems.
Washing machines
Auto-focus cameras
Anti-lock braking systems
Another example of automated system is found at a nuclear power plant where in the
event of an accident, many automated steps take place such as:
Peripheral
Is an input, output or storage device that is or that can be attached to the CPU e.g.
printer, CD-ROM, keyboard etc.
Normally the speed at which the CPU operates is vastly different from the speed at
which the input, output or storage device operates e.g. the CPU can send data to a
printer much more quickly than the printer can print. Similarly the CPU can accept
data much faster than the rate at which it can be typed at the keyboard.
Because of the above situations, there is a need for an interface device to help with the
transmission of data between the CPU and the storage or I/O(Input/Output) devices
because they have different speeds called a buffer.
Buffer
Temporary storage area used for holding data during transfer between the CPU,
storage, input and output devices so as to compensate for different speeds of
equipment. There are 3 types of buffers as below:
input buffer – which accepts data of the slow speed of an input device and
release it at electronic speed to the CPU e.g. the keyboard buffer
output buffer – accepts data at electronic speed from the CPU and release it at a
slower speed of the output device e.g. the printer buffer
storage or memory buffer – a reserved section of primary storage which accepts
data at electronic speed from the CPU for storage and release it slowly to the
storage device.
Interrupt
Is a signal generated by a device which causes a break in the execution of an active
program. It can also be defined as a signal which causes the suspension(pausing) of
the execution of an active program following a signal from a device to the CPU to carry
out another function.
Virus detected !
Printer out of paper !
Or
CLEAN FILE CONTINUE
110
Interrupt priority
Is the order of importance or urgency given to the interrupts by the processor basing
on priority rules of the computer. Jobs with higher priority will get the processor time
ahead of those with low priority.
Polling
Testing or sending a signal to a terminal in a multi-access(network) system to
establish whether it is holding data for transmission or processing, if it doesn’t the
processor moves on to the next terminal so as to allow timesharing.
The main disadvantage with polling is that time is wasted in checking each and every
terminal on the network.
Handshaking
Is exchanging of electronic communication signals between two devices so as to
recognize each other and establish a communication link before data transmission. A
common example of handshaking happens between the computer and printer when
the computer is turned on whilst the printer is also on and produces a sound.
Normally the I/O devices are much slower than the CPU, this means the processor will
spend most of its time waiting for data to arrive from the slow input devices before it
can continue with other duties.
For input, all required input data is spooled(written to a disk) where it can be retrieved
and processed more quickly. And for output, information to the printers may be
spooled(written to a disk) which is a high speed device and when the printer becomes
free, output will be printed.
De-spooling
Is the process of transferring data from a storage device to the output device such as
the printer.
111
DATA COMMUNICATIONS AND NETWORKING
Data communication
Is the transmission and receiving of coded data e.g. text, voice, video etc over a
communication link between two or more computers.
Network
Is an interconnection of two or more computers and related equipment such as
printers and fax machines. There are two basic categories or types of networks:
Categories of networks
There are two basic categories of networks as below:
Characteristics of LAN
Is confined to a small geographical area
Transfer data at very high speeds
Usually managed by the company using the LAN
LANs are used in areas such as schools where Bursar, Secretary, Headmaster, Deputy
Headmaster etc will have their computers linked together or PCs in a computer
laboratory linked together to form a network. A college or university may also have
LAN linking the administration computers in various offices to form a LAN.
Characteristics of WAN
Is spread over a wider geographical area
Transmit data at much slower speed than LAN
Usually interconnect a number of LANs
At times managed by a third party company especially telecommunications
companies
WANs are used by large companies with many branches within different towns and
cities e.g. banks, credit shops like Edgars, Truworths, Nyore-Nyore etc and
multinational companies with branches in different countries e.g. Unilever(formerly
Lever Brothers), Johnson & Johnson International.
Advantages of networks(networking)
Disadvantages of networks
Initial setup cost is high for purchasing PCs, cables, hubs, servers, MODEM,
telephone, network cards, network software etc
Networks need technical expertise to setup and manage the network such as
engineers, technicians and systems administrators
Viruses can spread easily on the network
There is a risk of unauthorized access to sensitive data if no proper security
measures and access levels are put in place
Network services
(a) Data migration – technology that moves infrequently used data from online to
near line or offline storage
(b) File archiving – aka backup i.e. offline storage meant to create duplicate copies
of online data in case of system failures
(c) Communication – aka messaging facility of e-mail, fax and voice mail. (NB voice
mail involves connecting a computer to a telephone to incorporate telephone
voice mail messages on the PC technically called telephony)
(d) Directory services – provide location information for different files on the
network i.e. this is a facility often called information booth
(e) Groupware – recent technology that enables several users to communicate
when solving a problem through shared document management e.g. interactive
conferencing using network programs like Novel GroupWise, Lotus Notes,
Microsoft Exchange etc
(f) Security - this enables control of access to data and other resources by
assigning different access levels and passwords to various network users
(g) Print services – this service enables various print jobs from users on the
network to be queued and printed in order
(h) File Transfer Service – which enables users to upload or download files from
their workstations to other workstations on the network
113
(i) File update synchronization – which enables every user to have latest copy of
updated files through use of central update system
Data communication media(links)
Are devices used to provide a communication link between computers on a network.
There are two classes of transmission media as below:
Disadvantage
Is more expensive than the first two
114
Wireless transmission media
(a) microwaves
Are devices which transmit high speed radio signals in a straight line through
space approximately 25 miles apart. Microwaves make use of devices called
repeaters placed in between microwaves which receive, amplify(boost signals) and
retransmit signals to the next microwave.
(b) satellite
Are devices placed into stationery parking orbits in space. Satellites act as
reflectors by accepting signals from one point on earth e.g. from a microwave or
earth station and then relaying the signals to earth stations commonly called
‘satellite dish’ or ‘dish antenna’.
(e) Radio
Transmit signals using waves to a connecting point
Cost
Installation requirements i.e. technical specialists and physical layout of the
network)
Attenuation i.e. loss of signal strength or degrading as the signal travels further
from its origination
Immunity from electromagnetic interference like noise from motors, lighting etc
Bandwidth i.e. capacity of the medium to transmit data
Wireless networks
Are as a result of developments in wireless transmission media. These have seen
increased emphasis on wireless networks. Presently wireless technology is mainly used
in some LANs, WANs and mobile computing where mobile machines connect to the
home or office network using cellular technology or satellite systems.
(a) Spaces where cabling is impossible e.g. historical buildings where renovation is
prohibited for political reasons
(b) People who move around a lot in their work environment e.g. network
administrators, doctors, nurses
(c) People who travel a lot outside their work environment e.g. sales executives,
directors, journalists, highway police patrol officers, etc
(d) Temporary installations e.g. temporary departments, offices and branches set
up for a specific purpose that will be removed later
115
NOTE:
Server – is a high performance computer which provides some service for other
computers connected to it e.g. print server, file server, fax server, mail server etc
Simplex transmission – where data is sent in one direction only e.g. as in the
case of pagers, teletext etc
Half duplex transmission – where data is sent in both directions but not at the
same time e.g. in the walkie talkie. In order to talk using a walkie talkie, one
has to press a button and the other person has to wait until that button is
released before talking.
Duplex transmission – where it’s possible to transmit data in both directions at
the same time. An example is the telephone line where one can talk and listen
at the same time.
Signal modulation
Modulation is the conversion of digital signals to analog signals for transmission over a
telephone line and demodulation is the reverse process of converting analog signals
back to digital signals which can be recognized and processed by a computer. The
process of modulation and demodulation is done by a device called
MODEM(MOdulator/DEModulator). A MODEM can be in-built into the computer or it
can be a separate device.
In a computer, data is represented in bits(binary digits) i.e. a series of 1s and 0s. The
following diagrams show simple digital and analog signals:
116
Digital signal An analog signal
The distance between 0 and the highest voltage(+5V) is called amplitude. The number
of cycles per second is called frequency and is measured in Hertz(Hz). The speed of
transmission is called the baud rate and is measured in bits per second(bps).
M M
computer O O computer
D D
EM EM
Network topologies
Topology simply refers to the structure or layout of a network. The following are the
three basic types of network topologies:
117
118
Terminator bus(cable) terminator
Server
119
Ring networks communicate by using one of the two methods below:
token ring passing where an electronic token is passed around the network
and picked up by the terminal wishing to transmit data.
CSMA/CD(Carrier Sense Multiple Access with Collision Detection) which works
on the protocol that each device on the network must listen for any sign of
traffic before transmission to avoid transmission clash.
120
Other equipment used on networks
Gateway
A connecting computer link between two networks with different architectures(design)
which performs the conversion process that makes the networks compatible.
Bridge
A computer or device that connects two LANs with the same identical protocol e.g. two
Ethernet or two token passing LANs.
Router
A multi-purpose device that can be used to connect similar or different networks as
well as taking other network management tasks such as network traffic control.
Network security
In typical industrial setup network administrators are tasked with setting standard
security measures which includes:
(a) Creating folders or directories where related data files can be stored
(b) Backing up files in case of accidental or deliberate data loss or corruption
(c) Deleting unnecessary and temporary files which may be taken up space and
slowing down computer speed
(d) Archiving files i.e. copying files not regularly used to a specified directory or
storage medium
(e) File protection by setting ‘read only mode’ to sensitive files
(f) Hiding some sensitive files so as to avoid unauthorized access to that file
NOTE:
data corruption can be as a result of virus infection, disk crush, deliberate or
fraudulent alteration of figures
directory or folder is a space created on a disk where usually related files can be
stored together with information enabling them to be retrieved.
A simple disk-head crash can destroy data within a fraction of a second leading to loss
of business.
121
Examples of consequence of system failure
Failure during a salary batch process can be irritating and cause a delay
Failure on air traffic control system can be disastrous and kill hundreds of
people
Failure of nuclear control system can be catastrophic and kill millions of people
Disaster planning
Large companies have emergency plans and even after suffering from fire damage,
such companies can still be set up and run again within a day.
Data backup
Simply refers to making duplicate copies of data on some storage media which can be
used to restore data in the event of a disk crush or other problem.
Disaster recovery
(Ref Microsoft Networking Essentials)
Introduction
One of the major issues that a network administrator must address is the possibility of
system failure and associated downtime. The administrator must handle two major
issues to guard against the danger of a failed server:
Protecting data
Reducing downtime
Protecting Data
Natural disasters, equipment failures, power surges, and deliberate vandalism can
cause the catastrophic loss of precious network data. Protecting the data is a primary
responsibility of the network administrator.
122
Important strategies for preventing data loss are:
Backup
Uninterruptible Power Supply (UPS)
Fault-tolerant design
Backup
A backup schedule is an essential part of any data-protection strategy. You should
design a backup system that is right for your situation and the data on your network.
Arcadia’s BackupExec
Cheyenne’s ArcServe
Microsoft’s Backup utility
file generations
are successive versions of backup files that make use of the grandfather, father, son
concept.
Note: The cycle begins again after the third backup copy
Most backup commands mark the file with the date and time of the backup so that it
is known when a copy of the file was last saved.
Many companies choose to make two copies of each backup tape and store one of the
copies off-site, thereby guarding against a catastrophic event such as a fire.
Advantage:
123
makes the restoration process easier because there is theoretically only
one set of tapes from which to restore
Disadvantages:
require a lengthy backup process each night
if the backup tape media is not large enough, someone must be
physically present to change the tapes
may not be enough time in the night to perform a full backup of all the
data thus following day’s business may be affected
Incremental backup. Backs up only those files that have changed since the
last full or incremental backup.
Advantage
much faster because they back up only those files that have been
changed since the last backup
Disadvantage
in case data corruption on master copy, only the last updated files will
be recovered as compared to full backup
Differential backup. Backs up the specified files if the files have changed
since the last backup. Differential backup is similar to incremental backups
except that they do not reset the Archive attribute, which means that each
backup during the week backs up all files changed since the last full backup.
A typical backup plan includes some combination of these backup types performed at
regular intervals. One common practice is to perform an incremental or differential
backup each day and a full backup every week.
Companies therefore try to purchase backup media and create a schedule to automate
the backup process (a process called scheduled backup e.g. running backup every
night at 10:00pm), thus not requiring anyone to be physically present to change the
tape media.
If the drives fail, the administrator must restore the last full backup set, as well as all
the incremental backups performed since the drive failure.
A full backup once a week (generally Friday or Saturday) and differentials every
other day means that theoretically only two tapes are needed in case of failure:
the last full backup and the last differential.
Most backup utilities can generate a backup log. It is recommended that the
administrator must test his backup system before he can trust it. Perform a
sample backup, restore the data, and check the data to be sure it is identical to
the original.
You can attach a tape drive directly to a single server, or you can back up
several servers across the network at once. Backups over the network are
convenient for the administrator, but they can produce considerable network
traffic. You can reduce the effects of this extra traffic if you place the computer
attached to the tape drive on an isolated network segment and connect it
directly to secondary network interface 124
cards on each of the servers.
Uninterruptible Power Supply(UPS)
An Uninterruptible Power Supply (UPS) is a special battery (or sometimes a generator)
that supplies power to an electronic device in the event of a power failure.
UPSs are commonly used with network servers to prevent a disorderly shutdown by
warning users to log out. After a predetermined waiting period, the UPS software
performs an orderly shutdown of the server.
offer enough power to take over and allow proper shutdown after sudden power
outage(cut)
regulating power distribution
protection against power surges.
Remember that in most cases a UPS generally does not provide for continued network
functionality for longer than a few minutes. A UPS is not intended to keep the server
running through a long power outage, but rather is designed to give the server time to
do what it needs to before shutting down.
Some networks also have UPSs connected to their hubs and routers as well, giving
administrators remote access to the servers so they can perform shutdown tasks in
the event of a power outage.
One of the most popular UPS manufacturers is APC (American Power Conversion), a
company that offers a full line of power supply and UPS products. A large UPS can
service numerous components at once.
Introduction
Next to data security, keeping the network up and running properly is the most crucial
day-to-day task of an administrator. The loss of a hard drive, even if not disastrous,
can be a major inconvenience to your network users and may cost your organization
in lost time and money. Procedures for lessening or preventing downtime from single
hardware failures should be implemented.
Disk configurations that enable this sort of protection are called fault-tolerant
configurations. It should be noted that fault-tolerant configurations are not designed
as a replacement for system tape backups.
Using RAID
A vital tool for protecting a network’s data is the use of a Redundant Array of
Inexpensive Disks (RAID). A RAID system combines two or more disks to create a large
virtual disk structure that enables you to store redundant copies of the data.
Data stripping
Refers to the capability of arranging data in different sequences across drives Data can
be read or written to these same sectors from either disk, thus improving performance.
This requires at least two disks, and the striped partitions must be of the same size.
Disk mirroring
Is defined as two hard drives—one primary, one secondary—that use the same disk
channel (controller cards and cable). Disk mirroring is most commonly configured by
using disk drives contained in the server.
Disk mirroring is called disk duplexing when a separate drive controller is added for
each drive. Duplexing, is a form of mirroring that enables you to configure a more
robust hardware environment.
You can use mirroring, however, to create two copies of the server’s data and operating
system, which enables either disk to boot and run the server. If one drive in the pair
fails, for instance, the other drive can continue to operate. Disk mirroring can be
expensive, though, because it requires 2GB of disk space for every 1GB you want to
mirror.
The power source must have enough wattage to handle the additional devices.
Mirroring requires two drives, and the mirrored partitions must be of the same size.
Windows NT Server supports mirroring.
Server mirroring
Server mirroring refers to having one server completely mirrored in all forms to
another server. This means that if Server A goes down for any reason whatsoever,
such as a failed hard drive, failed network card, or even a blown motherboard, the
mirrored Server B takes over the duties of Server A. This type of fault tolerance is
offered by Microsoft in their Microsoft Cluster Server product.
Super server
Is a hardware solution offered by several different hardware manufacturers where
almost any piece of equipment can be changed on the super server without shutting
down the server. This can mean that the super server can have hot swappable
components such as hard drives, CPUs, and even RAM.
126
Error checking methods
Introduction
Errors as a result of data distortion or data loss during transmission can be caused by
any or a combination of the following:
1. Check digit
Is an extra digit added to numerical data such as code numbers and calculated from
the original digits to check for errors or loss of characters as a result of data transfer
procedures.
Check digit is used to determine if a numerical code e.g. ISBN has been received
correctly
ISBN
Product code
Employee code
Customer code
Supplier code
Account numbers
The check digit can be calculated using a number of methods and the most common
being the mathematical method called the Modullus 11 Method.
Each digit is assigned a weight. The last digit is given a weight of 2 and the
weights increment by 1 going leftwards ( i.e. 3, 4, 5, 6 etc)
Each digit is multiplied by its weight and products added together
Sum of products is divided by 11 and remainder obtained
Remainder is subtracted from 11 to give the check digit.
Example
Calculate check digit of the product code: 1522
127
Original code :1 5 2 2
Assign weights :5 4 3 2
Multiply digit by weights :5 20 6 4 (e.g. 1 x 5 = 5, 5 x 4 = 20 etc)
Add products : 5 + 20 + 6 + 4 = 35
Divide sum by 11 : 35 / 11 = 3 remainder 2
Subtract remainder from 11 : 11 – 2 = 9
The check digit is therefore 9 and the complete code with the check digit would be :
15229
Parity bit
Is an extra bit(binary digit) 1 added to the character code.
Parity bit is used to determine if a byte representing a character has been received
correctly. The receiving device checks on the seven data bits and parity bit and counts
the number of 1s. Parity bit checks can either be even or odd parity:
Even parity
The number of Is in each successfully transmitted set of bits must be an even
number and only then can the data be assumed to be correct
Odd parity
The number of Is in each successfully transmitted set of bits must be an odd
number and only then can the data be assumed to be correct.
Note:
This method only works with systems that use 7 data bits such as viewdata systems
and don’t work on modern systems which use 8 data bits representing a character.
Space parity
Where a parity bit is used and always set to 0
Mark parity
Where a parity bit is used and always set to 1
128
If parity is checked on a per-character basis, the method is called vertical redundancy
checking, or VRC; if checked on a block-by-block basis, the method is called
longitudinal redundancy checking, or LRC. Parity is used for checking data transferred
within a computer or between computers.
3. Checksum
Adding together all elements e.g. bytes of a block of data produces a single element
known as the checksum. The checksum can then be stored with the block of data and
provides a check when transmitted.
Other applications of checksumming
Checksumming, can also be used for detecting virus infection by using
mathematical calculations to compare the state of executable programs before and
after they are run. If the checksum has not changed, then the system is uninfected.
Checksumming software can detect an infection only after it has occurred. However,
as this technology is dated and some viruses can evade it.
The most serious threats to the integrity and authenticity of computer information
come from those who have been entrusted with usage privileges and yet commit
computer fraud. For example, authorized persons may secretly transfer money in
financial networks, alter credit histories, sabotage information, or commit bill
payment or payroll fraud. Modifying, removing, or misrepresenting existing data
threatens the integrity and authenticity of computer information. For example,
omitting sections of a bad credit history so that only the good credit history remains
violates the integrity of the document. Entering false data to complete a fraudulent
transfer or withdrawal of money violates the authenticity of banking information.
These crimes can be prevented by using a variety of techniques. One such
technique is checksumming. Microsoft ® Encarta ® Reference Library 2005
Checksumming sums the numerically coded word contents of a file before and after it
is used. If the sums are different, then the file has been altered.
Note:
A parity bit is transmitted with the code for each character whereas the checksum is
transmitted with a block of data.
129
DATA LOGGING
Data logging is the process of collecting and recording data at timed regular intervals
over a period of time for later analysis.
See page 301 Information Systems For You for examples on application of data
logging(conditions in a fish tank, variation of water temperature e.g. heating or cooling
etc)
Data loggers normally have large buffers because they collect data over a long period
of time.
Collection of data
Various sensors are normally used to collect data such as: temperature sensors,
weight sensors, pressure sensors, pH sensors, light sensors, humidity sensors, oxygen
and water level sensors.
NOTE: temperature data for computer processing is normally collected by any of the
devices below:
Thermistor
Digital thermometer
Temperature sensor
Temp probe
NOT ordinary thermometer as found in hospitals because it doesn’t have a computer
connection interface.
In most cases data collected from sensors is displayed in one of the following forms:
Graphical form
Tabular form
Numeric form
logging interval
Refers to the time taken between one reading and the next reading e.g. per second, per
minute, per hour etc.
Period of logging
Refers to the total logging time from the first reading to the last reading.
130
(a) Can be used to record of events that are too fast for humans to monitor
(b) Automatic data collection over a specified period of time
(c) More reliable and accurate readings e.g. trend of temperature rise of water bing
heated
(d) Constant readings as equipment does not get bored like humans
(e) Multiple(many) readings can be taken at the same time
(f) Greater frequency of readings e.g. every second or minute
(g) Has facility for storage of readings(buffer)
(h) Has facility for display of results
131